cyphunk / sbdl
Secure Boot Definition Languag
☆10Updated 2 years ago
Alternatives and similar repositories for sbdl:
Users that are interested in sbdl are comparing it to the libraries listed below
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆14Updated 2 years ago
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13Updated 4 years ago
- A tiny set of helper scripts for ipinfo☆17Updated 4 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- ☆18Updated 3 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 6 months ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- ☆18Updated 7 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆34Updated 2 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Sigma Engine implementation in TypeScript☆27Updated last year
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 3 years ago
- A Python package to download Zone Files from the Centralized Zone Data Service hosted by ICAAN.☆17Updated last year
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆21Updated 2 years ago
- Docker image: DNS over HTTPS proxy☆11Updated 4 years ago
- Quijote is an highly configurable HTTP middleware for API security.☆47Updated 4 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A small utility that aims to automate and simplify some tasks related to software release cycles.☆43Updated 3 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- ☆17Updated last year
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago